CIS461 Chapter 8 – Flashcards

Unlock all answers in this set

Unlock answers
question
Dell Computer's use of information systems to improve efficiency and implement "mass customization" techniques to maintain consistent profitability and an industry lead illustrates which business objective?
answer
competitive advantage
question
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of information systems to achieve which business objective?
answer
survival
question
Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case?
answer
operational excellence
question
Order data for baseball tickets and bar code data are examples of
answer
raw input
question
Converting raw data into a more meaningful form is called
answer
processing
question
Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.
answer
True
question
Transaction processing systems are most commonly used by the senior management level of an organization
answer
False
question
A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
answer
True
question
Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
answer
True
question
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
answer
True
question
Producing bills of materials is a business process within the ________ function.
answer
manufacturing and production
question
In green computing, reducing computer power consumption is a top priority.
answer
True
question
An application server may reside on the same computer as a Web server or on its own dedicated computer.
answer
True
question
Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.
answer
True
question
The operating system is used to manage the computer's activities.
answer
True
question
SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers.
answer
True
question
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
answer
True
question
The Domain Name System (DNS) converts IP addresses to domain names.
answer
False
question
A DBMS makes the
answer
physical database available for different logical views
question
A DBMS reduces data redundancy and inconsistency by
answer
minimizing isolated files with repeated data.
question
A DBMS separates the logical and physical views of data.
answer
True
question
A VPN
answer
is an encrypted private network configured within a public network
question
A data warehouse is composed of
answer
historic and current internal data
question
A data warehouse may be updated by a legacy system.
answer
True
question
A field identified in a record as holding the unique identifier for that record is called the
answer
key field.
question
A field identified in a table as holding the unique identifier of the table's records is called the
answer
primary key.
question
A network that covers broad geographical regions is most commonly referred to as a(n)
answer
wide area network
question
A protocol is a standard set of rules and procedures for the control of communications in a network.
answer
True
question
Data mining is a tool for allowing users to
answer
find hidden relationships in data
question
Increasingly, voice, video, and data communications are all based on Internet technology
answer
True
question
In a telecommunications network architecture, a protocol is
answer
a standard set of rules and procedures for control of communications in a network.
question
In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships.
answer
True
question
IPv6 is being developed in order to
answer
create more IP addresses
question
Fiber-optic cable is more expensive and harder to install than wire media.
answer
True
question
Every record in a file should contain at least one key field.
answer
True
question
Each characteristic or quality describing a particular entity is called an attribute.
answer
True
question
Duplicate data in multiple data files is called data ________.
answer
redundancy
question
Digital subscriber lines
answer
operate over existing telephone lines to carry voice, data, and video
question
One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as
answer
hotspots
question
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called
answer
normalization
question
The most prominent data manipulation language today is
answer
SQL
question
The logical view
answer
presents data as they would be perceived by end users.
question
________ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.
answer
"Security"
question
Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called
answer
social engineering
question
Unauthorized access is a security challenge that is most likely to occur in which of the following points of a corporate network?
answer
client computer
question
Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
answer
True
question
Wal-mart's strategy of continuous replenishment of inventory based on actual customer purchases is an example a pull-based SCM model.
answer
True
question
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of
answer
click fraud
question
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data to be used by multiple functions and business processes best describes
answer
ERP systems.
question
Supply chain inefficiencies can waste as much as 25 percent of a company's operating costs.
answer
True
question
Sniffing is a security challenge that is most likely to occur in which of the following points of a corporate network?
answer
communications lines
question
To minimize the expense of implementing an enterprise system, businesses can opt to curtail the customization of an enterprise package and instead change business processes to match the software.
answer
True
question
Viruses can be spread through e-mail.
answer
True
question
Customer relationship management systems typically provide software and online tools for sales, customer service, and
answer
marketing
question
A firewall allows the organization to
answer
prevent unauthorized communication both into and out of the network
question
Zero defects cannot be achieved in larger software programs because fully testing programs that contain thousands of choices and millions of paths would require thousands of years
answer
True
question
A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called the ________ effect.
answer
bullwhip
question
Implementing an enterprise application typically requires organizational change as well as adjustments to existing business processes.
answer
True
question
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.
answer
True
question
In addition to e-mail, instant messages and P2P file-sharing can also pose security threats to computer systems and networks
answer
True
question
NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs.
answer
True
question
Enterprise software is built around thousands of predefined business processes that reflect
answer
best practices
question
The most common type of electronic evidence is
answer
e-mail
question
Why is overstocking warehouses not an effective solution for a problem of low availability?
answer
It increases inventory costs
question
Redirecting a Web link to a different address is a form of
answer
spoofing
question
Enterprise systems require fundamental changes in the way the business operates.
answer
True
question
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
answer
True
question
In a phenomenon called ________, some argue that large numbers of people can make better decisions about a wide range of topics or products than a single person or even a small committee of experts.
answer
the wisdom of crowds
question
In general, for digital goods, the marginal cost of producing another unit is about zero.
answer
True
question
The act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology?
answer
interactivity
question
The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology?
answer
richness
question
Amazon.com uses Web personalization as a major marketing tool.
answer
True
question
EBay is an example of
answer
C2C e-commerce
question
Disintermediation provides major benefits to the distributor
answer
False
question
Digital goods are goods that are
answer
delivered digitally.
question
In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis?
answer
subscription
question
Reducing the business process layers in a distribution channel is called
answer
disintermediation
question
Selling products and services directly to individual consumers via the Internet best describes
answer
B2C e-commerce
question
The effort required to locate a suitable product is called
answer
search costs
question
The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called
answer
procurement
question
The quality of ubiquity, as it relates to e-commerce, is illustrated by
answer
the availability of the Internet everywhere and anytime.
question
What type of knowledge management system did Canadian Tire implement in order to improve the communications with dealers?
answer
content management system
question
Which of the following is not a Web 2.0 tool firms are using to foster collaboration?
answer
intranets
question
Which of the following was the leading marketing format in 2010?
answer
search engine
question
An example of the service provider business model is Netflix, an online video store and streaming media outlet.
answer
False
question
A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is called a(n)
answer
exchange
question
An example of the content provider business model is Salon.com, an online magazine
answer
True
question
An information system project's scope is directly related to its business requirements
answer
True
question
An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.
answer
True
question
Between 30 and 40 percent of all software projects are "runaway" projects that far exceed original schedule and budget projections.
answer
True
question
Counterimplementation refers to a deliberate strategy to thwart the implementation of an information system or an innovation in an organization.
answer
True
question
Mandatory use of a system is one effective way of overcoming user resistance to an information system.
answer
False
question
The ________ consists of systems analysts, specialists from the relevant end-user business areas, application programmers, and perhaps database specialists.
answer
project team
question
The ________ reviews and approves plans for systems in all divisions.
answer
IS steering committee
question
The larger the systems project, the more risk the project runs in terms of being completed on time, within budget, and according to project requirements.
answer
True
question
The level of a project's risk is influenced primarily by
answer
project size, project structure, and the level of technical expertise.
question
The most widely used project management software today is
answer
Microsoft Project.
question
The most widely used project management software today is
answer
Microsoft Project.
question
The most widely used project management software today is
answer
Microsoft Project.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New